Email address | private |
---|---|
First Active | 2012-06-11 |
Last Active | 2014-06-06 |
Madness Pro versions 1.14 and below suffer from a remote SQL injection vulnerability.
d2daaf442e4919212f2463c778d13d77b88a02030d6b175e700fbc91535cdb18
Madness Pro versions 1.14 and below suffer from a persistent cross site scripting vulnerability.
47454d2b1745735a214d20ff97b1200d84e29bfccfd4345615c493e72e439f2c
TORQUE Resource Manager versions 2.5.x through 2.5.13 suffer from a stack buffer overflow vulnerability.
01db40756d23f2ac4bcfe60e33e9ff8f16a701a683f0b663f33585f704651449
Proof of concept exploit that extracts a database from a Herpes Net version 3.0 bot panel.
cc5282d37d5f2246d390d44424efdff5947d038323bb02b1e1e686ccb66512ab
This Metasploit module exploits a vulnerability found in the command and control panel used to control Dexter (Point of Sale malware). This is done by accessing the PHP page used by bots to report in (gateway.php) which does not sanitize input. Input is encrypted and encoded, but the key is supplied by the bot connecting. The 'page' parameter is used in this case. The command and control panel designates a location to upload files, and can be used as a reliable location to write a PHP shell. Authentication is not needed to exploit this vulnerability.
dce8241e9805e316fba94ae258cb1d530cdf76424afa2b06b216ab421407282c
Proof of concept SQL injection exploit for the panel in Dexter CasinoLoader. It exploits the gateway for bots to connect in, which sanitizes none of its input. This version of the exploit just dumps database data, and can create a GEXF file to make a graph in Gephi.
e23bf1f6bf9d448ec21c0e08084f86886e247080217d33e730242930b073b444
Bitbot C2 Panel suffers from cross site scripting and remote SQL injection vulnerabilities in gate2.php.
9acd6e911b5c392e36f1f1742b3974de1315faa9855834c5051c0afe4c08ea43
This Metasploit module exploits backdoors that can be sighted all over the leaked source code of the Carberp botnet C2 Web Panel.
8e430225d99c7af533d24ccc317c9b9e1fefd8bc6b0785c793924b5d5a2741a0
This Metasploit module exploits unauthenticated versions of the "STUNSHELL" web shell. This Metasploit module works when safe mode is enabled on the web server. This shell is widely used in automated RFI payloads.
06341fc12ebcf2e13776c2ddafaa57edbd47f88dc20ac17daa4c87e2d4466e2b
This Metasploit module exploits unauthenticated versions of the "STUNSHELL" web shell. This Metasploit module works when safe mode is disabled on the web server. This shell is widely used in automated RFI payloads.
079ce9781a20fac112fd7690e6c284a6257f4927ebf9c7ae45b6ac4eb0b72f57
This Metasploit module exploits a lack of authentication in the shell developed by v0pCr3w and is widely reused in automated RFI payloads. This Metasploit module takes advantage of the shell's various methods to execute commands.
c98b44143d435c087fc71dd51541d105f13f0b99cdf31def59cce893a060e474
This Metasploit module allows remote command execution on the PHP IRC bot Ra1NX by using the public call feature in private message to covertly bypass the authentication system.
0ca2edc3146081af6b7cfa1d1b095743c8a69ad6f34856249388fa89e835a862
Archin WordPress theme version 3.2 suffers from an unauthenticated configuration access vulnerability.
d3acec9570e446b9ac94a5014d65862eb7047d8ce33e4dd77bd95bcbc5219200
This Metasploit module allows remote command execution on the PHP IRC bot pbot by abusing the usage of eval() in the implementation of the .php command. In order to work, the data to connect to the IRC server and channel where find pbot must be provided. The module has been successfully tested on the version of pbot analyzed by Jay Turla, and published on Infosec Institute, running over Ubuntu 10.04 and Windows XP SP3.
af5927c4e9d6a607a05e48844259bb81f722ee9404fcdab77834d99f0a04d614
This perl script attacks pBot by leveraging a hidden .eval command to delete and kill the bot.
19d0cd2419b1ba8636cb8720f58807484e2cd5fe55c43028edb94c4dfbfc419f
This paper describes an attack of the iterated use of hashing functions used as key stretching algorithms where the state of a hash can be transferred to the next hash function.
52f96766730e53dd9b718a0a0d0d999d36d38002c0a17023db1db12a5d4196c7
This cracker was created to brute force master passwords for the Password Safe tool at http://passwordsafe.sourceforge.net/.
9240452d901cbdc70840e61553e42a2cb50559acbc476a049ea72583be9c28e1
Multiple Site5 WordPress themes suffer from an email spoofing vulnerability.
3ae588eeb35bf8ce5278a0e55fc825b27cefdef0759ac73636c048ab0ff52b56
Ballast Security felt the need to write this paper as almost countless services that we trust with our passwords are handling them irresponsibly. This is a good read for anyone who needs to store password hashes.
9b72c8fd503ebd25cdbebb177f28dba5b59183730431d92ae584879271c90add
This whitepaper discusses the insecurity of poorly designed remote file inclusion payloads. This is part two.
357450c73effdc1d8d79eadc0c1966d2cf52597ec2b85ef66ef49ae5a9a554f2
This whitepaper discusses the insecurity of poorly designed remote file inclusion payloads. This is part one.
0ad627634c11abc77c0211c9fe0d4a8c8b65595f116f610eceb4b969e304e19d